From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection., , , , и . CoRR, (2023)The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices., , , , , и . NDSS, The Internet Society, (2023)On the Neural Backdoor of Federated Generative Models in Edge Computing., , , , , и . ACM Trans. Internet Techn., 22 (2): 43:1-43:21 (2022)The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices., , , , , и . CoRR, (2022)Backdoor Attack on Machine Learning Based Android Malware Detectors., , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (5): 3357-3370 (2022)LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer., , , , , и . AAAI, стр. 945-953. AAAI Press, (2024)Double-Flow-based Steganography without Embedding for Image-to-Image Hiding., , , , , и . CoRR, (2023)LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model., , , , , , , и . CoRR, (2024)StyleFool: Fooling Video Classification Systems via Style Transfer., , , , , и . SP, стр. 1631-1648. IEEE, (2023)Explore the hidden treasure in protein-protein interaction networks - An iterative model for predicting protein functions., и . J. Bioinform. Comput. Biol., 13 (5): 1550026:1-1550026:22 (2015)